vulnerability
Amazon Linux 2023: CVE-2025-12495: Important priority package update for openexr
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Dec 23, 2025 | Jan 26, 2026 | Jan 26, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Dec 23, 2025
Added
Jan 26, 2026
Modified
Jan 26, 2026
Description
Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.
A flaw was found in OpenEXR, a library for handling High Dynamic Range (HDR) image files. This heap-based buffer overflow vulnerability allows a remote attacker to execute arbitrary code on a user's system. This occurs when a user is tricked into opening a specially crafted EXR file, exploiting a weakness in how the software processes image data. Successful exploitation could lead to complete control over the affected system.
The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.
A flaw was found in OpenEXR, a library for handling High Dynamic Range (HDR) image files. This heap-based buffer overflow vulnerability allows a remote attacker to execute arbitrary code on a user's system. This occurs when a user is tricked into opening a specially crafted EXR file, exploiting a weakness in how the software processes image data. Successful exploitation could lead to complete control over the affected system.
Solutions
amazon-linux-2023-upgrade-openexramazon-linux-2023-upgrade-openexr-debuginfoamazon-linux-2023-upgrade-openexr-debugsourceamazon-linux-2023-upgrade-openexr-develamazon-linux-2023-upgrade-openexr-libsamazon-linux-2023-upgrade-openexr-libs-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.